Preferred Language
Articles
/
ijs-1195
Impact of ZnO Atomic Ratio on Structural, Morphological and Some Optical Properties of (SnO2)1-x (ZnO)x Thin Films
...Show More Authors

In this work, SnO2 and (SnO2)1-x(ZnO)x composite thin films with different ZnO atomic ratios (x=0, 5, 10, 15 and 20%) were prepared by pulsed laser deposition technique on clean glass substrates at room temperature without any treatment. The deposited thin films were characterized by x-ray diffraction atomic force microscope  and UV-visible spectrophotometer to study the effect of the ZnO atomic ratio on their structural, morphological and optical properties. It was found that the crystallinety and the crystalline size vary according to ZnO atomic ratio. The surface appeared as longitudinal structures which was convert to spherical shapes with increasing ZnO atomic ratio. The optical transmission and energy gap increased with increasing ZnO atomic ratio. 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Mon May 15 2017
Journal Name
International Journal Of Image And Data Fusion
Image edge detection operators based on orthogonal polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (10)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The Infertility problems HS Effects on human development
...Show More Authors
  • The problem of infertility considers one of the chronic problem a which faced the
    individual & families equally . This problem causes a negative effects in psychological ,
    social and development fields. The infertility contributes in weakening the human
    development, when the human development has become as a centre point which centered
    about individual preparing , rehabilitation, training and knowledge toreach to the required
    excellence.
    We think that , the infertility destroys the socially development; therefore the socially and
    scientific institutions are working hard to find successful solution to resolve the problem
    infertility through sophisticated and scientific methods. This problem
... Show More
View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Molecular Genetics Study on Autistic Patients in Iraq
...Show More Authors

This study reflected on the relationship between contactin associated protein-like
2 gene (CNTNAP2) and autism spectrum disorders. The study includes forty autistic
patients and forty non autistic children as control groups (twenty unaffected sibling
and twenty unrelated children). DNA was extracted from Blood samples for
molecular detection of CNTNAP2 mutations associated with ASDs by using
Polymerase Chain Reaction (PCR) technique and sequencing analysis. PCR reaction
was performed to amplify exon 20 of CNTNAP2 gene. The PCR results revealed that
identical bands related to exon 20 of CNTNAP2 gene were present in all samples.
Therefore, five samples (four from autistic patients and one from control sibling)
we

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
Survey study on Cholera Disease in South Baghdad
...Show More Authors

The study includes collection of data about cholera disease from six health centers from nine locations with 2500km2 and a population of 750000individual. The average of infection for six centers during the 2000-2003 was recorded. There were 3007 cases of diarrhea diagnosed as cholera caused by Vibrio cholerae. The percentage of male infection was 14. 7% while for female were 13. 2%. The percentage of infection for children (less than one year) was 6.1%, it while for the age (1-5 years) was 6.9%and for the ages more than 5 years was 14.5%.The total percentage of the patients stayed in hospital was 7.7%(4.2%for male and 3.4%for female). The bacteria was isolated and identified from 7cases in the Central Laboratory for Health in Baghdad. In

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is,
in fact, who or what it is declared to be. As the dependence upon computers and
computer networks grows, the need for user authentication has increased. User’s
claimed identity can be verified by one of several methods. One of the most popular
of these methods is represented by (something user know), such as password or
Personal Identification Number (PIN). Biometrics is the science and technology of
authentication by identifying the living individual’s physiological or behavioral
attributes. Keystroke authentication is a new behavioral access control system to
identify legitimate users via their typing behavior. The objective of thi

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
A Secure Session Management Based on Threat Modeling
...Show More Authors

A session is a period of time linked to a user, which is initiated when he/she arrives at a web application and it ends when his/her browser is closed or after a certain time of inactivity. Attackers can hijack a user's session by exploiting session management vulnerabilities by means of session fixation and cross-site request forgery attacks.
Very often, session IDs are not only identification tokens, but also authenticators. This means that upon login, users are authenticated based on their credentials (e.g., usernames/passwords or digital certificates) and issued session IDs that will effectively serve as temporary static passwords for accessing their sessions. This makes session IDs a very appealing target for attackers. In many c

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Cryptography with Dynamic DNA Depending on Edge Detection
...Show More Authors

Making the data secure is more and more concerned in the communication era. This research is an attempt to make a more secured information message by using both encryption and steganography. The encryption phase is done with dynamic DNA complementary rules while DNA addition rules are done with secret key where both are based on the canny edge detection point of the cover image. The hiding phase is done after dividing the cover image into 8 blocks, the blocks that are used for hiding selected in reverse order exception the edge points. The experiments result shows that the method is reliable with high value in PSNR

View Publication Preview PDF
Crossref